A Manipulated Cyclic Permutation Data Scrambling Approach for Data Security
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Views: 147 , Downloads: 109 | CTR: 74 % | Weekly Popularity: ⮙3

Research Paper | Computer Science & Engineering | Nigeria | Volume 5 Issue 7, July 2016

A Manipulated Cyclic Permutation Data Scrambling Approach for Data Security

OYINLOYE Oghenerukevwe Elohor, Benson Ojedayo

Data sharing in every organization is a high-level priority asset. These are mostly kept electronically and exchanged via networks. The advances in technology, has made data vulnerable to manipulation and unreliable. Most techniques used to encrypt data have shown that they can be reconstructed using statistical approach with low time complexity. In this paper, a manipulated cyclic permutation system was developed for data encryption. The system performs its function by converting a plain text to cipher text and vice versa using the manipulated cyclic permutation method. The system was tested using 15 messages and showed to be 75 % reliable and resisted the guessing attack proposed by users.

Keywords: Cyclic permutation, data security, encryption, scrambling, matrix

Edition: Volume 5 Issue 7, July 2016

Pages: 2104 - 2106

Share this Article

How to Cite this Article?

OYINLOYE Oghenerukevwe Elohor, Benson Ojedayo, "A Manipulated Cyclic Permutation Data Scrambling Approach for Data Security", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=ART2016725, Volume 5 Issue 7, July 2016, 2104 - 2106

147 PDF Views | 109 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'data security'

Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Views: 134 , Downloads: 98 | CTR: 73 %

Review Papers, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1949 - 1953

A Review: Data Security and Privacy Advancement Approach on Webos with Desktop-As-A-Service

Pooja Saini, Kanchan Narula

Share this Article

Views: 142 , Downloads: 102 | CTR: 72 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 2535 - 2538

A Survey on Security Mechanism using Colors and Armstrong Numbers

Nutan Gurav, Pratap Singh

Share this Article

Views: 127 , Downloads: 104 | CTR: 82 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1319 - 1323

Advanced Technique for Comprehensive Data Security

Pramendra Kumar, Vijay Kumar Sharma

Share this Article

Views: 125 , Downloads: 104 | CTR: 83 % | Weekly Popularity: ⮙3

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2467 - 2469

Literature Review on: Secure Sharing of Data for Dynamic Groups in Cloud

Shazadi Fatima Rizvi, A. N. Jaiswal

Share this Article

Similar Articles with Keyword 'encryption'

Views: 7 , Downloads: 3 | CTR: 43 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Views: 134 , Downloads: 73 | CTR: 54 % | Weekly Popularity: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020

Pages: 470 - 478

Ensuring Video Integrity Using Watermark - Chaining by SVD and DWT

Aditya Tiwari, Ayush Pandey

Share this Article

Views: 170 , Downloads: 93 | CTR: 55 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 1069 - 1073

Energy Efficient and Trust Based Node Disjoint Multipath Routing Protocol for WSN

Rucha Agrawal, Simran Khiani

Share this Article

Views: 130 , Downloads: 98 | CTR: 75 % | Weekly Popularity: ⮙2

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1833 - 1836

A Review of Enhanced Technique for Cloud Data Storage Security Using Data Slicing

Roshan M. Kawale, Bharti L. Dhote

Share this Article

Views: 137 , Downloads: 99 | CTR: 72 % | Weekly Popularity: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2338 - 2340

Remotely Counsel and Governing WLAN through Wi-Fi Enabled Android Device

Rohit Goudagaon, Harshal Pingle, Pankaj Jadhav, A. S. Sondkar

Share this Article

Similar Articles with Keyword 'scrambling'

Views: 147 , Downloads: 109 | CTR: 74 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, Nigeria, Volume 5 Issue 7, July 2016

Pages: 2104 - 2106

A Manipulated Cyclic Permutation Data Scrambling Approach for Data Security

OYINLOYE Oghenerukevwe Elohor, Benson Ojedayo

Share this Article

Views: 150 , Downloads: 119 | CTR: 79 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, Iraq, Volume 3 Issue 6, June 2014

Pages: 2004 - 2009

Image Encryption Based on Pixel Shuffling with 3D Chaotic System

Asia Mahdi Naser Alzubaidi

Share this Article

Views: 120 , Downloads: 119 | CTR: 99 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 2114 - 2117

Image Cryptography Technique based on FFT

Mudiyala. Akila Sowndarya, Damodara V V S Phani Kumar

Share this Article

Views: 152 , Downloads: 120 | CTR: 79 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, Iraq, Volume 6 Issue 7, July 2017

Pages: 2178 - 2182

An Overview of Crypto-Compressive Based on Selective Coding

Enas Kh Alamiry, Faisal G. Mohammed

Share this Article

Views: 122 , Downloads: 121 | CTR: 99 % | Weekly Popularity: ⮙5

Dissertation Chapters, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016

Pages: 1597 - 1601

Lossless and Reversible Combine Data Hiding using 4LSB in Encrypted Images with Asymmetric Cryptography

Prashant Gholve, H. A. Hingoliwala

Share this Article

Similar Articles with Keyword 'matrix'

Views: 81 , Downloads: 63 | CTR: 78 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, China, Volume 10 Issue 1, January 2021

Pages: 1165 - 1168

A Capsule Robot Attitude Transformation Perception Method based on Intestinal Fold Features

Chengcheng Yan, Yanping Hu

Share this Article

Views: 156 , Downloads: 82 | CTR: 53 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 3, March 2013

Pages: 165 - 167

Statistical Analysis of DCT Coefficients for Ascertaining Ears Biometrics

Nisha, Jatinder Kansal, JPS Raina

Share this Article

Views: 147 , Downloads: 98 | CTR: 67 % | Weekly Popularity: ⮙1

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 528 - 532

Knowledge Fusion Technique Using Classifier Ensemble by Combining the Sets of Classification Rules

Jaydeep B. Patil, Vaishali Nandedkar

Share this Article

Views: 139 , Downloads: 100 | CTR: 72 % | Weekly Popularity: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1054 - 1058

Colour Extended Visual Cryptography based on MKGED

T. Anuradha, Dr. K. Usha Rani

Share this Article

Views: 142 , Downloads: 101 | CTR: 71 % | Weekly Popularity: ⮙3

Research Paper, Computer Science & Engineering, Saudi Arabia, Volume 4 Issue 4, April 2015

Pages: 1669 - 1671

Algorithmic Research and Application Using the Rayleigh Method

Anghel Drugarin Cornelia Victoria, M. Ayaz Ahmad, N. Ameer Ahamad, Vyacheslav V. Lyashenko

Share this Article
Top